Check Point
More information: https://www.checkpoint.com
Description of technology
SANDBLAST - a solution for malware detection without relying on known malware signatures. It is available in the form of ThreatEmulation, which functions as a classic sandbox solution, analyzing files for unsafe behavior, e.g., initiating unauthorized network connections, making unauthorized system file or registry changes, downloading unauthorized code from the Internet, etc. Files can be analyzed in the vendor’s cloud or locally on a dedicated device. ThreatExtraction, another component of SandBlast, can instantly sanitize files from potential threats – the cleaned file is sent to the recipient almost immediately, while the original is analyzed in the background by ThreatEmulation. Additional features include IPS, Anti-Virus, Anti-Bot, and Zero-Phishing, protecting users from Internet threats as well as internal network threats.
Cloud Security - Cloud Security Posture Management
CLOUDGUARD POSTURE MANAGEMENT - is a part of the CloudGuard Cloud Native Security platform that automates the management of multi-cloud resources and services, including visualization and security assessment. The solution detects misconfigurations and enforces best practices and compliance standards.
Cloud Security - Cloud Workload Protection Platform
CLOUDGUARD FOR WORKLOAD PROTECTION - provides a fully automated solution for securing cloud environments with Zero Trust policies. It allows automatic enforcement of security for DevOps teams.
Cloud Security - Cloud-Native Protection Platform
CLOUD-NATIVE APPLICATION PROTECTION PLATFORM - a cloud-native security model that integrates Cloud Security Posture Management (CSPM), Cloud Service Network Security (CSNS), and Cloud Workload Protection Platform (CWPP) into a single holistic platform.
Cloud Security - Security Service Edge
HARMONY CONNECT - enables secure connection to cloud infrastructure using Zero Trust Network Access (ZTNA) principles. Users outside the corporate network are fully protected via a cloud internet gateway, which provides functionalities like IPS, access control, and DLP. Harmony Connect offers both direct and API-based secure access.
HARMONY ENDPOINT - a comprehensive protection package for desktops, laptops, and mobile devices, integrated with Check Point network security. It reduces the risk of corporate devices being compromised, even when employees work remotely or behave carelessly. Harmony Endpoint can also include document encryption for MS Office, file analysis in a sandbox environment, and anti-phishing options.
QUANTUM SECURITY GATEWAY - provides the following functions: application control (P2P, Tor, Gmail, Facebook), identity recognition via Microsoft Active Directory and other authentication systems, Intrusion Prevention System (IPS), protection against Internet attacks, and antivirus and IPS inspection of SSL/TLS-encrypted traffic.
MOBILE SECURITY - забезпечує всебічний захист мобільних пристроїв, запобігаючи шкідливому програмному забезпеченню, фішингу та атакам через мережу. Рішення впроваджує політики безпеки, контролює відповідність пристроїв вимогам та захищає конфіденційні дані на платформах iOS та Android. Воно також інтегрується з корпоративними системами управління, забезпечуючи централізовану видимість, автоматизовану реакцію на загрози та контекстну аналітику, що гарантує безпечну роботу мобільних пристроїв у межах організації.
QUANTUM IOT PROTECT - anomaly detection in industrial networks based on behavioral analysis and pattern matching of malicious activity. Automatically detects assets, visualizes communication paths down to OT network levels, where technological processes are controlled. Passive monitoring system – no active scanning required, no software installation on endpoints, sends security alarms to SOC via SYSLOG.
REMOTE ACCESS VPN / SITE-TO-SITE VPN - delivers secure connectivity by encrypting traffic and authenticating users. It ensures data confidentiality, integrity, and availability across public and private networks. Integrated with identity management and security policies, the solution enforces access control, monitors sessions, and protects sensitive corporate resources from unauthorized access.
CLOUDGUARD - security within virtual environments providing protection for virtual machines that external physical security devices cannot ensure, including internal network communication inspection between VMs. Next-generation firewall functionalities integrate with virtual environments such as VMware NSX.